期刊文献+

面向恶意网页的静态特征体系研究 被引量:1

Research on Static Feature System in Malicious Web Pages
下载PDF
导出
摘要 恶意网页是一种新型的Web攻击手法,攻击者通常将一段恶意代码嵌入网页中,当用户访问该网页时,恶意代码会试图利用浏览器或其插件漏洞在后台隐秘地执行一系列恶意行为.针对恶意网页静态特征抽取问题,本文从已有的特征中选取了14个信息增益值较高的特征,并通过分析恶意网页的混淆手法提出了8个新的特征,共同组成了22维的静态特征体系.此外,针对已有特征抽取流程提出两点改进:对不同编码格式的原始网页进行预处理;回送Java Script脚本动态生成的的HTML代码,用以进一步抽取HTML相关特征.实验表明,在不均衡数据集和均衡数据集上,本文的特征体系具有一定的有效性. Malicious Web pages is a new kind of Web-based attack method. In drive-by-download exploits, attackers embed malicious code into a Web page. When a victim visits this page, the code attempts to download and execute malwares by exploiting vulnerabilities in browser or its plugins. Considering the problem of extracting static feature from malicious Web page, this paper selects 14 static features based on information gain theory and proposes 8 new static features are proposed by analyzing obfuscated scripts. In addition, two improvements of original feature extraction process are proposed as follows: preprocessing for original Web page based on different code format; reprocessing HTML code which are dynamically generated by JavaScript to further extract HTML features. The experimental result shows that, on unbalanced data set and balanced data set, our static feature system is provided with a certain validity.
作者 刘畅
出处 《计算机系统应用》 2016年第7期213-218,共6页 Computer Systems & Applications
关键词 恶意网页 特征抽取 静态特征体系 信息增益 JAVA SCRIPT malicious Web pages feature extraction static feature system information gain JavaScript
  • 相关文献

参考文献2

二级参考文献20

  • 1王学军,郭亚军,兰天.构造一致性判断矩阵的序关系分析法[J].东北大学学报(自然科学版),2006,27(1):115-118. 被引量:56
  • 2戴敏,黄亚楼,王维.基于文件静态信息的木马检测模型[J].计算机工程,2006,32(6):198-200. 被引量:15
  • 3吕跃进.指数标度判断矩阵的一致性检验方法[J].统计与决策,2006,22(18):31-32. 被引量:71
  • 4Tam C Y, Tummala V M. An application of the AHP invendor selection of a telecommunications system [J]. International Journal of Management Science, 2001,29 (2) : 171 - 182.
  • 5Clamav[ EB/OL]. [ 2014-09-01]. http://www, clamav, net/.
  • 6SEIFERT C, WELCH I, KOMISARCZUK P. Honey teraction client Honeypot[ EB/OL]. [ 2014- 09- 01 ] researchgate, net/publication/202141516_HoneyC - teraction_Client_Honeypot.
  • 7SEIFERT C, STEENSON R. Capture-HPC[ EB/OL]. [2014-09- 01]. https://projects, honeynet, org/capture-hpc/.
  • 8WANG Y-M, BECK D, JIANG X, et al. Automated Web patrol with strider HoneyMonkeys: finding websites that exploit browser vulnerabilities[ EB/OL]. [ 2014- 09 - 10 ]. http://www, researchgate. net/publication/248501367_Automated_Web _Patrol _with _Strider_ HoneyMonkeys.
  • 9NAZARIO J. PhoneyC: a virtual client honeypot[ C]// LEET'09: Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats. Berkley: USENIX Associaiton, 2009: 6.
  • 10IKINCI A, HOLZ T, FREILING F, et al. Monkey-Spider: detecting malicious websites with low-interaction honeyclients [ EB/OL]. [2009-09-01 ]. http://citeseerx, ist. psu. edu/viewdoc/summary? doi = 10. 1.1. 210. 1385.

共引文献13

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部